Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2024, 13:22

General

  • Target

    a1f4d53a9934e3678361ed2d6cb9bf55.exe

  • Size

    184KB

  • MD5

    a1f4d53a9934e3678361ed2d6cb9bf55

  • SHA1

    28e94f363cc1c4759c826edbeedf4bbedbc67ff1

  • SHA256

    c3da750fe3cec2e3538bee213419cb433ac3df608c402d0d3b312918e293a7b9

  • SHA512

    0698578d8d8e5eece3db7c8f7b41a202a77ed86482aca6c84e2c2ad843161c2ed2bcdeba01a00209e5a577f5496375a8f004c509564571465c83e06e3945db4d

  • SSDEEP

    3072:uj9Roz+MRlAK3OjYdTD/tCFbGDg6Ys9I0hGxTqPC/7lPvpFg:ujToDCK3TdP/tCKqDv7lPvpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1f4d53a9934e3678361ed2d6cb9bf55.exe
    "C:\Users\Admin\AppData\Local\Temp\a1f4d53a9934e3678361ed2d6cb9bf55.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-52073.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-52073.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2652
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-44912.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-44912.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2768
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-21451.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-21451.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2416
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-39261.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-39261.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2024
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-34133.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-34133.exe
              6⤵
                PID:2888
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-23521.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-23521.exe
                  7⤵
                    PID:2068
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-41959.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-41959.exe
                      8⤵
                        PID:1468
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-44704.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-44704.exe
                          9⤵
                            PID:320
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-60044.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-60044.exe
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:520
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-31752.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-31752.exe
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetWindowsHookEx
                    PID:2204
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-33226.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-33226.exe
                      6⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      PID:832
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-17933.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-17933.exe
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:868
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-52271.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-52271.exe
                          8⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:3040
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-18411.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-18411.exe
                            9⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:3056
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-44034.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-44034.exe
                              10⤵
                                PID:2468
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-47594.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-47594.exe
                                  11⤵
                                    PID:2832
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-6136.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-6136.exe
                                      12⤵
                                        PID:564
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-13108.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-13108.exe
                                          13⤵
                                            PID:1608
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-62086.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-62086.exe
                                              14⤵
                                                PID:3028
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-31163.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-31163.exe
                                                  15⤵
                                                    PID:1988
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-20193.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-20193.exe
                                                      16⤵
                                                        PID:436
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-32405.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-32405.exe
                                      7⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1684
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-61522.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-61522.exe
                                        8⤵
                                          PID:972
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-19582.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-19582.exe
                                            9⤵
                                              PID:1600
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-28669.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-28669.exe
                                                10⤵
                                                  PID:1696
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-9792.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-9792.exe
                                                    11⤵
                                                      PID:2528
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-42799.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-42799.exe
                                            6⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2864
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-52271.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-52271.exe
                                              7⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2008
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-64838.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-64838.exe
                                                8⤵
                                                  PID:2728
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-23474.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-23474.exe
                                                    9⤵
                                                      PID:2812
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-14361.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-14361.exe
                                                        10⤵
                                                          PID:876
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-31985.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-31985.exe
                                                            11⤵
                                                              PID:2420
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-47042.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-47042.exe
                                                                12⤵
                                                                  PID:2432
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-29113.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-29113.exe
                                                                    13⤵
                                                                      PID:2548
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-41756.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-41756.exe
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:1108
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-46329.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-46329.exe
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1544
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-6422.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-6422.exe
                                                          7⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2688
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-19639.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-19639.exe
                                                            8⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:2012
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-12913.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-12913.exe
                                                              9⤵
                                                                PID:580
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-57314.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-57314.exe
                                                                  10⤵
                                                                    PID:1984
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-24863.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-24863.exe
                                                                      11⤵
                                                                        PID:2784
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-52094.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-52094.exe
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2724
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-52695.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-52695.exe
                                                                7⤵
                                                                • Executes dropped EXE
                                                                PID:1836
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-37293.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-37293.exe
                                                                  8⤵
                                                                    PID:2872
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-19774.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-19774.exe
                                                                      9⤵
                                                                        PID:2992
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-34782.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-34782.exe
                                                                          10⤵
                                                                            PID:552
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-28508.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-28508.exe
                                                                              11⤵
                                                                                PID:2712
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-51637.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-51637.exe
                                                                                  12⤵
                                                                                    PID:2436
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-53425.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-53425.exe
                                                                                      13⤵
                                                                                        PID:1944
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-45273.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-45273.exe
                                                                                          14⤵
                                                                                            PID:2636
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-1434.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-1434.exe
                                                                                    10⤵
                                                                                      PID:2724
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-2820.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-2820.exe
                                                                                        11⤵
                                                                                          PID:2888
                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-2968.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-2968.exe
                                                                                            12⤵
                                                                                              PID:2896
                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-61510.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-61510.exe
                                                                                                13⤵
                                                                                                  PID:972
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-38864.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-38864.exe
                                                                                                    14⤵
                                                                                                      PID:324
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-28126.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-28126.exe
                                                                                                    13⤵
                                                                                                      PID:2404
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-14459.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-14459.exe
                                                                                          7⤵
                                                                                            PID:2016
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-58367.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-58367.exe
                                                                                              8⤵
                                                                                                PID:684
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-37172.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-37172.exe
                                                                                                  9⤵
                                                                                                    PID:1668
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-57727.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-57727.exe
                                                                                                      10⤵
                                                                                                        PID:1960
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-52543.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-52543.exe
                                                                                                          11⤵
                                                                                                            PID:2012
                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-58954.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-58954.exe
                                                                                            3⤵
                                                                                            • Executes dropped EXE
                                                                                            • Loads dropped DLL
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            • Suspicious use of WriteProcessMemory
                                                                                            PID:2740
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-10288.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-10288.exe
                                                                                              4⤵
                                                                                              • Executes dropped EXE
                                                                                              • Loads dropped DLL
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              • Suspicious use of WriteProcessMemory
                                                                                              PID:652
                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-60340.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-60340.exe
                                                                                                5⤵
                                                                                                • Executes dropped EXE
                                                                                                • Loads dropped DLL
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:2016
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-9297.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-9297.exe
                                                                                                  6⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:1764
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-27227.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-27227.exe
                                                                                                    7⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:760
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-44034.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-44034.exe
                                                                                                      8⤵
                                                                                                        PID:1952
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-61538.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-61538.exe
                                                                                                          9⤵
                                                                                                            PID:1648
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-43770.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-43770.exe
                                                                                                              10⤵
                                                                                                                PID:2464
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-38573.exe
                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-38573.exe
                                                                                                                  11⤵
                                                                                                                    PID:2008
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-28454.exe
                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-28454.exe
                                                                                                                      12⤵
                                                                                                                        PID:2200
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-47032.exe
                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-47032.exe
                                                                                                                          13⤵
                                                                                                                            PID:1348
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-39034.exe
                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-39034.exe
                                                                                                                          12⤵
                                                                                                                            PID:1616
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-7361.exe
                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-7361.exe
                                                                                                                6⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                PID:1668
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-52394.exe
                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-52394.exe
                                                                                                                  7⤵
                                                                                                                    PID:1712
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-16121.exe
                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-16121.exe
                                                                                                                      8⤵
                                                                                                                        PID:1260
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-57717.exe
                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-57717.exe
                                                                                                                          9⤵
                                                                                                                            PID:2696
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-30464.exe
                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-30464.exe
                                                                                                                    5⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                    PID:3020
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-56308.exe
                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-56308.exe
                                                                                                                      6⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                      PID:1464
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-48502.exe
                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-48502.exe
                                                                                                                        7⤵
                                                                                                                          PID:1508
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-55980.exe
                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-55980.exe
                                                                                                                            8⤵
                                                                                                                              PID:520
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-39779.exe
                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-39779.exe
                                                                                                                                9⤵
                                                                                                                                  PID:1400
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-17498.exe
                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-17498.exe
                                                                                                                                    10⤵
                                                                                                                                      PID:2956
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-36830.exe
                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-36830.exe
                                                                                                                                        11⤵
                                                                                                                                          PID:1488
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-11886.exe
                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-11886.exe
                                                                                                                            4⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Loads dropped DLL
                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                            PID:1812
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-53262.exe
                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-53262.exe
                                                                                                                              5⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                              PID:1576
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-23313.exe
                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-23313.exe
                                                                                                                                6⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                PID:1064
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-61714.exe
                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-61714.exe
                                                                                                                                  7⤵
                                                                                                                                    PID:1284
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-775.exe
                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-775.exe
                                                                                                                                      8⤵
                                                                                                                                        PID:1800
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-25991.exe
                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-25991.exe
                                                                                                                                          9⤵
                                                                                                                                            PID:952
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-19816.exe
                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-19816.exe
                                                                                                                                              10⤵
                                                                                                                                                PID:1632
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-47042.exe
                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-47042.exe
                                                                                                                                                  11⤵
                                                                                                                                                    PID:3024
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-3949.exe
                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-3949.exe
                                                                                                                                                      12⤵
                                                                                                                                                        PID:620
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-2491.exe
                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-2491.exe
                                                                                                                                                          13⤵
                                                                                                                                                            PID:1320
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-2482.exe
                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-2482.exe
                                                                                                                                                7⤵
                                                                                                                                                  PID:1756
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-52119.exe
                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-52119.exe
                                                                                                                                                    8⤵
                                                                                                                                                      PID:888
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-35908.exe
                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-35908.exe
                                                                                                                                                        9⤵
                                                                                                                                                          PID:1732
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-42481.exe
                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-42481.exe
                                                                                                                                                            10⤵
                                                                                                                                                              PID:2024
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-36743.exe
                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-36743.exe
                                                                                                                                                    5⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                    PID:2496
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-48078.exe
                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-48078.exe
                                                                                                                                                      6⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                      PID:2148
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-60562.exe
                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-60562.exe
                                                                                                                                                        7⤵
                                                                                                                                                          PID:436
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-6011.exe
                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-6011.exe
                                                                                                                                                            8⤵
                                                                                                                                                              PID:2192
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-50028.exe
                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-50028.exe
                                                                                                                                                                9⤵
                                                                                                                                                                  PID:2148
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-57947.exe
                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-57947.exe
                                                                                                                                                                    10⤵
                                                                                                                                                                      PID:2412
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-30942.exe
                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-30942.exe
                                                                                                                                                                        11⤵
                                                                                                                                                                          PID:484
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-63845.exe
                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-63845.exe
                                                                                                                                                                            12⤵
                                                                                                                                                                              PID:1772
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-64636.exe
                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-64636.exe
                                                                                                                                                                          10⤵
                                                                                                                                                                            PID:820
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-6191.exe
                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-6191.exe
                                                                                                                                                                              11⤵
                                                                                                                                                                                PID:2192
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-12794.exe
                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-12794.exe
                                                                                                                                                              2⤵
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              • Loads dropped DLL
                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                                                                              PID:2612
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-5114.exe
                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-5114.exe
                                                                                                                                                                3⤵
                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                                                                PID:2252
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-63573.exe
                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-63573.exe
                                                                                                                                                                  4⤵
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                                                                  PID:2488
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-231.exe
                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-231.exe
                                                                                                                                                                    5⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                    PID:784
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-45094.exe
                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-45094.exe
                                                                                                                                                                      6⤵
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                      PID:1504
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-55649.exe
                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-55649.exe
                                                                                                                                                                        7⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                        PID:2932
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-52271.exe
                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-52271.exe
                                                                                                                                                                          8⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                          PID:2768
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-34449.exe
                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-34449.exe
                                                                                                                                                                            9⤵
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                            PID:876
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-7578.exe
                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-7578.exe
                                                                                                                                                                              10⤵
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                              PID:1088
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-42192.exe
                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-42192.exe
                                                                                                                                                                                11⤵
                                                                                                                                                                                  PID:2508
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-21331.exe
                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-21331.exe
                                                                                                                                                                                    12⤵
                                                                                                                                                                                      PID:2996
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-19305.exe
                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-19305.exe
                                                                                                                                                                                        13⤵
                                                                                                                                                                                          PID:2604
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-12901.exe
                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-12901.exe
                                                                                                                                                                                            14⤵
                                                                                                                                                                                              PID:2512
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-32405.exe
                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-32405.exe
                                                                                                                                                                                7⤵
                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                PID:2620
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-3302.exe
                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-3302.exe
                                                                                                                                                                                  8⤵
                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                  PID:2136
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-42109.exe
                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-42109.exe
                                                                                                                                                                                    9⤵
                                                                                                                                                                                      PID:1468
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-2778.exe
                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-2778.exe
                                                                                                                                                                                        10⤵
                                                                                                                                                                                          PID:1364
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-30890.exe
                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-30890.exe
                                                                                                                                                                                            11⤵
                                                                                                                                                                                              PID:2696
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-41336.exe
                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-41336.exe
                                                                                                                                                                                                12⤵
                                                                                                                                                                                                  PID:2620
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-23625.exe
                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-23625.exe
                                                                                                                                                                                                    13⤵
                                                                                                                                                                                                      PID:1476
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-16311.exe
                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-16311.exe
                                                                                                                                                                                                        14⤵
                                                                                                                                                                                                          PID:3016
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-59559.exe
                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-59559.exe
                                                                                                                                                                                                            15⤵
                                                                                                                                                                                                              PID:1708
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-25362.exe
                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-25362.exe
                                                                                                                                                                                                      11⤵
                                                                                                                                                                                                        PID:1796
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-6606.exe
                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-6606.exe
                                                                                                                                                                                                          12⤵
                                                                                                                                                                                                            PID:2764
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-63084.exe
                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-63084.exe
                                                                                                                                                                                                    8⤵
                                                                                                                                                                                                      PID:1612
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-64330.exe
                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-64330.exe
                                                                                                                                                                                                        9⤵
                                                                                                                                                                                                          PID:2488
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-2737.exe
                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-2737.exe
                                                                                                                                                                                                            10⤵
                                                                                                                                                                                                              PID:2716
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-52600.exe
                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-52600.exe
                                                                                                                                                                                                                11⤵
                                                                                                                                                                                                                  PID:2408
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-53119.exe
                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-53119.exe
                                                                                                                                                                                                                    12⤵
                                                                                                                                                                                                                      PID:2064
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-15363.exe
                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-15363.exe
                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                          PID:2308
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-56931.exe
                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-56931.exe
                                                                                                                                                                                                            7⤵
                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                            PID:1960
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-39675.exe
                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-39675.exe
                                                                                                                                                                                                              8⤵
                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                              PID:2244
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-5113.exe
                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-5113.exe
                                                                                                                                                                                                                9⤵
                                                                                                                                                                                                                  PID:1596
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-62555.exe
                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-62555.exe
                                                                                                                                                                                                                    10⤵
                                                                                                                                                                                                                      PID:1552
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-41061.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-41061.exe
                                                                                                                                                                                                                        11⤵
                                                                                                                                                                                                                          PID:2092
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-51253.exe
                                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-51253.exe
                                                                                                                                                                                                                            12⤵
                                                                                                                                                                                                                              PID:1756
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-56684.exe
                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-56684.exe
                                                                                                                                                                                                                                13⤵
                                                                                                                                                                                                                                  PID:2452
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-18112.exe
                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-18112.exe
                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                          PID:1844
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-42960.exe
                                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-42960.exe
                                                                                                                                                                                                                            9⤵
                                                                                                                                                                                                                              PID:1632
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-41777.exe
                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-41777.exe
                                                                                                                                                                                                                                10⤵
                                                                                                                                                                                                                                  PID:2628
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-63845.exe
                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-63845.exe
                                                                                                                                                                                                                                    11⤵
                                                                                                                                                                                                                                      PID:2212
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-24863.exe
                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-24863.exe
                                                                                                                                                                                                                                        12⤵
                                                                                                                                                                                                                                          PID:1604
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-47032.exe
                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-47032.exe
                                                                                                                                                                                                                                            13⤵
                                                                                                                                                                                                                                              PID:572
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-34740.exe
                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-34740.exe
                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                              PID:824
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-10340.exe
                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-10340.exe
                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                PID:2608
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-64755.exe
                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-64755.exe
                                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                                    PID:2296
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-50469.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-50469.exe
                                                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                                                        PID:824
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-39779.exe
                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-39779.exe
                                                                                                                                                                                                                                          9⤵
                                                                                                                                                                                                                                            PID:2528
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-61673.exe
                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-61673.exe
                                                                                                                                                                                                                                              10⤵
                                                                                                                                                                                                                                                PID:1284
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-56022.exe
                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-56022.exe
                                                                                                                                                                                                                                                  11⤵
                                                                                                                                                                                                                                                    PID:1568
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-39258.exe
                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-39258.exe
                                                                                                                                                                                                                                                      12⤵
                                                                                                                                                                                                                                                        PID:1552
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-28454.exe
                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-28454.exe
                                                                                                                                                                                                                                                          13⤵
                                                                                                                                                                                                                                                            PID:752
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-22243.exe
                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-22243.exe
                                                                                                                                                                                                                                                7⤵
                                                                                                                                                                                                                                                  PID:1492
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-20973.exe
                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-20973.exe
                                                                                                                                                                                                                                                    8⤵
                                                                                                                                                                                                                                                      PID:2392
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-33085.exe
                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-33085.exe
                                                                                                                                                                                                                                                        9⤵
                                                                                                                                                                                                                                                          PID:1660
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-26996.exe
                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-26996.exe
                                                                                                                                                                                                                                                            10⤵
                                                                                                                                                                                                                                                              PID:3008
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-50179.exe
                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-50179.exe
                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                  PID:2072
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-38270.exe
                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-38270.exe
                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                    PID:1384
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-10231.exe
                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-10231.exe
                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                      PID:2556
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-24958.exe
                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-24958.exe
                                                                                                                                                                                                                                                        7⤵
                                                                                                                                                                                                                                                          PID:2668
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-58336.exe
                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-58336.exe
                                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                                              PID:1988
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-12695.exe
                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-12695.exe
                                                                                                                                                                                                                                                                9⤵
                                                                                                                                                                                                                                                                  PID:1920
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-2436.exe
                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-2436.exe
                                                                                                                                                                                                                                                                    10⤵
                                                                                                                                                                                                                                                                      PID:1948
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-63570.exe
                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-63570.exe
                                                                                                                                                                                                                                                                        11⤵
                                                                                                                                                                                                                                                                          PID:2900
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-47791.exe
                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-47791.exe
                                                                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                                                                    PID:884
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-27849.exe
                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-27849.exe
                                                                                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                                                                                        PID:2172
                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-63077.exe
                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-63077.exe
                                                                                                                                                                                                                                                                          9⤵
                                                                                                                                                                                                                                                                            PID:2856
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-55711.exe
                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-55711.exe
                                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                    PID:2432
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-51927.exe
                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-51927.exe
                                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                      PID:2464
                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-3769.exe
                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-3769.exe
                                                                                                                                                                                                                                                                        7⤵
                                                                                                                                                                                                                                                                          PID:2704
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-46712.exe
                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-46712.exe
                                                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                                                              PID:2424
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-41391.exe
                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-41391.exe
                                                                                                                                                                                                                                                                                9⤵
                                                                                                                                                                                                                                                                                  PID:1952
                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-3643.exe
                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-3643.exe
                                                                                                                                                                                                                                                                                    10⤵
                                                                                                                                                                                                                                                                                      PID:2028
                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-8600.exe
                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-8600.exe
                                                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                                                PID:2740
                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-44854.exe
                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-44854.exe
                                                                                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                                                                                    PID:2976
                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-50303.exe
                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-50303.exe
                                                                                                                                                                                                                                                                                      8⤵
                                                                                                                                                                                                                                                                                        PID:2136
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-16033.exe
                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-16033.exe
                                                                                                                                                                                                                                                                                          9⤵
                                                                                                                                                                                                                                                                                            PID:1716
                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-51199.exe
                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-51199.exe
                                                                                                                                                                                                                                                                                              10⤵
                                                                                                                                                                                                                                                                                                PID:2964
                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-19203.exe
                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-19203.exe
                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                                                                                  PID:2704
                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-61684.exe
                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-61684.exe
                                                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                    PID:1612
                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-5021.exe
                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-5021.exe
                                                                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                      PID:744
                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-22676.exe
                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-22676.exe
                                                                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                        PID:2472
                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-48078.exe
                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-48078.exe
                                                                                                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                          PID:2184
                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-16022.exe
                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-16022.exe
                                                                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                                                                              PID:2836
                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-47044.exe
                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-47044.exe
                                                                                                                                                                                                                                                                                                9⤵
                                                                                                                                                                                                                                                                                                  PID:1348
                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-43889.exe
                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-43889.exe
                                                                                                                                                                                                                                                                                                    10⤵
                                                                                                                                                                                                                                                                                                      PID:1852
                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-28212.exe
                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-28212.exe
                                                                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                              PID:2360
                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-44719.exe
                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-44719.exe
                                                                                                                                                                                                                                                                                                7⤵
                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                PID:588
                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-45762.exe
                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-45762.exe
                                                                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                                                                    PID:2876
                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-6862.exe
                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-6862.exe
                                                                                                                                                                                                                                                                                                      9⤵
                                                                                                                                                                                                                                                                                                        PID:1544
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-33775.exe
                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-33775.exe
                                                                                                                                                                                                                                                                                                          10⤵
                                                                                                                                                                                                                                                                                                            PID:1992
                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-61673.exe
                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-61673.exe
                                                                                                                                                                                                                                                                                                              11⤵
                                                                                                                                                                                                                                                                                                                PID:2228
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-17027.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-17027.exe
                                                                                                                                                                                                                                                                                                                  12⤵
                                                                                                                                                                                                                                                                                                                    PID:1036
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-49066.exe
                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-49066.exe
                                                                                                                                                                                                                                                                                                                      13⤵
                                                                                                                                                                                                                                                                                                                        PID:2460
                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-58377.exe
                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-58377.exe
                                                                                                                                                                                                                                                                                                            7⤵
                                                                                                                                                                                                                                                                                                              PID:600
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-29717.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-29717.exe
                                                                                                                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                                                                                                                  PID:1908
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-41445.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-41445.exe
                                                                                                                                                                                                                                                                                                                    9⤵
                                                                                                                                                                                                                                                                                                                      PID:2316
                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-17621.exe
                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-17621.exe
                                                                                                                                                                                                                                                                                                                        10⤵
                                                                                                                                                                                                                                                                                                                          PID:240
                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-23038.exe
                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-23038.exe
                                                                                                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                PID:2392
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-12814.exe
                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-12814.exe
                                                                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                                                                    PID:1644
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-26899.exe
                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-26899.exe
                                                                                                                                                                                                                                                                                                                      7⤵
                                                                                                                                                                                                                                                                                                                        PID:3000
                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-50028.exe
                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-50028.exe
                                                                                                                                                                                                                                                                                                                          8⤵
                                                                                                                                                                                                                                                                                                                            PID:3028
                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-31300.exe
                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-31300.exe
                                                                                                                                                                                                                                                                                                                              9⤵
                                                                                                                                                                                                                                                                                                                                PID:588
                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-52517.exe
                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-52517.exe
                                                                                                                                                                                                                                                                                                                                  10⤵
                                                                                                                                                                                                                                                                                                                                    PID:2496
                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-41090.exe
                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-41090.exe
                                                                                                                                                                                                                                                                                                                                      11⤵
                                                                                                                                                                                                                                                                                                                                        PID:932
                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-3643.exe
                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-3643.exe
                                                                                                                                                                                                                                                                                                                                          12⤵
                                                                                                                                                                                                                                                                                                                                            PID:2472
                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-49621.exe
                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-49621.exe
                                                                                                                                                                                                                                                                                                                                        10⤵
                                                                                                                                                                                                                                                                                                                                          PID:2668
                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-46609.exe
                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-46609.exe
                                                                                                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                              PID:756
                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-63516.exe
                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-63516.exe
                                                                                                                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                PID:2568
                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-56779.exe
                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-56779.exe
                                                                                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                  PID:2708
                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-22348.exe
                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-22348.exe
                                                                                                                                                                                                                                                                                                                                    7⤵
                                                                                                                                                                                                                                                                                                                                      PID:2752
                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-32509.exe
                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-32509.exe
                                                                                                                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                                                                                                                          PID:2680
                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-28669.exe
                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-28669.exe
                                                                                                                                                                                                                                                                                                                                            9⤵
                                                                                                                                                                                                                                                                                                                                              PID:1520

                                                                                                                                                                                                                                                                                                                            Network

                                                                                                                                                                                                                                                                                                                            MITRE ATT&CK Matrix

                                                                                                                                                                                                                                                                                                                            Replay Monitor

                                                                                                                                                                                                                                                                                                                            Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                            Downloads

                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-10288.exe

                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                              72f79df164e5a626f5c5ec99509022bc

                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                              c0b00597315a157dc3fa79d893d54c11620da47f

                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                              d0e1612ec69219996a941c8f443c2d4c5597ac21812541a0849d6fd1a0d58a13

                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                              ca3bdf8217f6edb4f00698b95682290e8e0cae690a2ab8d84e6d8918efaebb1e5987af074c12d1524884483778d60b23016614bdd191de61648904fea7beaa6d

                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-19203.exe

                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                              e43702cef60d13ab7a00f76359f728d1

                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                              d83d21ccdc9d550a1088a21a0bfc1d3701367d97

                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                              749ae4827a84051ace992d5390eb4392e2b4894121f7b1732661f14c0668e918

                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                              53ecdd04fb6091ada054209a45e305f7975cd13af5ac2f74ce86c4fc2bd3854342e6cb1882916456e585ca9e11cab3c755b413074eae5dd9cc043c448fd1e36e

                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-31752.exe

                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                              8fd4c788c0485130e5d808b6a4491f8d

                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                              f7622421f0c4eeaf3bd7259094822881dfca971d

                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                              789fecd8d59c9203ed20fe9bdc06d154578c6e4d50b128bbeb98336437bb233b

                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                              848ef589d1b36e2e72e62d9d408fe18d034524fb5e9493d58bc94d410bfb4573b0fc3bbd07dc13914145519deeaeead202b40066a20a1e54cea21e009ca43953

                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-5114.exe

                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                              82f035dd3039f4ad257130e1bd48260f

                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                              631e12134d649382e4ce79805d985f1990a3142c

                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                              54adb26c604164202a9c3f0bc14cd87e1872e234bc685699e7e4ce4f72408dc5

                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                              0dbeeacd890ba59bade39a6f620e2cbbef1ef65a48bbbed34226de998dac44a5f9074d9e8c13f89e97ae75c4487e68a6465d40b8e834e080e5dc1493d6c71165

                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-58954.exe

                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                              d98eb2267514a6bbca1772768b17f770

                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                              a27b2b95a2c6b0a4981a422fc3008f52ca5f676c

                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                              3b568e5f95e27f308f1db4792f05fb8d307f500604ebbba915d3749d69e841b6

                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                              1da47c5315bcdc83b369564fbc4388e049f5cb7e4230e2a47bf2e28100bbe84bf57586a56576a5c9f076af4a642c75a7b317161b46e5d09c1ab818deae7fe1c7

                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-60044.exe

                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                              41131bf492bc65f30fc4c60e0e302336

                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                              033eff4e9dd679140a7048485ee16a9b93fe617e

                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                              3b0e2daf3ddf7b26e6b4f6c1d7cd1fcd098dac42194ac603778d8344573d127b

                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                              0b25c0d40a68587d4d450cc83579dfd3fbeb7e1cd434a3321320d5e88c60eb37da31464b54d7860106bb37b3038f7ec8cfd8a25e6072fb93a8371d3994a3ada9

                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-6011.exe

                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                              3846d9ccfe2d1cf2a06303f40e98beb0

                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                              95b7d72d2fc7201a4cc1a12543ce4ea8c0e676a6

                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                              494b05fb2941b832d088dc820f81238d736f9d692b94aaea5c8dc2aad5781cc5

                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                              341a90ed6cde542f001efc8ef932875b21528dfa1881c892ebd4172d358c85da94325cbd88af0cbc3241f5b4908412d014cd6775d5a8e514426434651049c179

                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-61684.exe

                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                              36317ff6ed130398ea15edc5eed9a3cc

                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                              4cb7e88f1c173dea52257fc77293437ba0bc41c8

                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                              e3b595bdc0a45006b63854fe7aa72ed1d208dd8988a0741cb0f8b3ffa83a1181

                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                              1e7320c3d4c169055b57f0a4757c3592f30ca7cd03be58c28e80485ca06b554de3cb1cfc38a71e318c364e5d9d3ef1340e59321c94f553fe2a6203c884121c93

                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-6606.exe

                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                              fdcc9a0da7c7d3841be4cf9fc0b5f123

                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                              e587889136134481728360bc6ed3eebe5643f02f

                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                              5fd5992ee715508a036d9845c8f69e046a8b029f7a01ffa7b2b2873623d3bea6

                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                              ecb32f34d84e234f8ebc1b3487a5692e89f1b04d9a5a2e7bf87bab577f7ff08cb8ac67663560809f71543397bcf6f6c1a6c98d09c4d17e705564fd8b8cef4669

                                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-11886.exe

                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                              ace2c2cf3834c2223c98641acba8b49d

                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                              64ac5b032d2a0510076851137f20fffd330bd91a

                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                              8b13f62b99e6661a74875ef95f74b1bfd2d84912880f73524de70f8f60f3fff2

                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                              07057cb20d841135e692353d0d720ab0fa2c676cbddb76c0383b72f40e5f87cf35e5ef2c696b7863e2e1e77576f5336a53b88439f96a5344f75ed407b9525790

                                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-12794.exe

                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                              183862d4502ff8fa897eb31ca8a07897

                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                              b355e5e014a2964309df63c6ee3e1670916efbbf

                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                              39d700473847bff2eb0e2d596099518ca855088fc162b5a5079563bf0adf3006

                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                              377b6d2cfc5d6de5384f03cb896bbc54a0f435e23068f6ad22885f941277a99af3ebeba7a942ac7e2efe1d335d02b6b90d985ec48ca2cce95d429965067f98b3

                                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-21451.exe

                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                              dc5345da1e2ea9d7e364be259f61834f

                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                              f113c9427bae26546520b179afd9fe0ac80878b8

                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                              70db03648b0723d80ff1daf56812fd6496245b817507b74fa336fb6c08ce2e45

                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                              13ec646d947682bdd5590a7a8e81e5739b03b42d7bc8862e75512d1d7632ccb8fc154e70140548c274b7facfd15cae3b5561bf7918db4c2e4e335879c0b17cc7

                                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-231.exe

                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                              f54876eabbd51322180c7328c7788088

                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                              7934e8e8a0a0689735b26308307fe2c663a354dc

                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                              80f6b5694cb23f02b2341d53580adc128ba7a0c4c171ca2a6e5225c529704258

                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                              7d32fbe62267f85b1a337d83e3e1087b2d032f7eea68a791d29da6a5a8c93b57a538d278682be63f5c642e3023e754b9208b12a0168eeffc561b4e3cf72354b7

                                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-33226.exe

                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                              81c857192ff2ebb4b6a7baf9cdc39782

                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                              c6d0226d2b6e1cee076ad9e6a3b19d3e51c1660d

                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                              9425a266af6a7cb5e2b8798bb98913b36a71e899f9795c3cdadc9f26b956e055

                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                              569a848d067275e77697cefe0d0021d3fb1a5f13306c8115219c7ca73b1e3b0f3cb732dd7311c636b29ac36c37a1f0ae0d34b91245042e7b4ec077cf099818d4

                                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-39261.exe

                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                              d30ddf17ac99ee738fd42541b8647b23

                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                              48141bc6934b37c6f5a7db56eaf182185db7ecba

                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                              16505881fa23c8adb74950f4d25b19d759224b788e47fc5758e48e7a5539b6e5

                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                              c1801ef6ed7cda3a56f46996834d690257290fd8b1faf44b36304b61490f3718e2806ec5129443ce95fb894964312ae8429296d8f62f606bf49428a0888da25b

                                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-44912.exe

                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                              7d16c7ab4a17f9519f4ba2fd021570c4

                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                              07cd70fc6f93e45fa2ba0c0969bcd17f5ec2fef7

                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                              93fc776db58ee847ebba9998b90eb0084e861067113d6a6b8672251e30d0aab9

                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                              9fd48da10a85ad22d4bbd45d188ea12bc755326a43ba29cb8564502815b1969bfedca3ca562eddc4edaf53955cd972425d34013cfe7d589f0c5e67a04dbd7793

                                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-50179.exe

                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                              541445c9defa043ecdef880cddf0d158

                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                              76ae4a46419780c11b25e73a390e12001d38d086

                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                              787dfa71e9bcb03650cc761574ce8203acaed29759733b1cee02a96d5557a009

                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                              ea56a566118ddc06f1009aed21c731312f1dab32197636d797fa071be8b3f58170d1ccf650c4ca40ce198113709697c7def2cba9bc20c47e3f8cc4fc2d452ada

                                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-52073.exe

                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                              45bb005e4e799b40d946a6b6ad7e1cae

                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                              42149046923c272cbe5c05764f8a319b3531bc50

                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                              f9b11e0baca08b7108fd3e0a4b8b61c6f90ed95e64a2d4ac168facfa060fe1b1

                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                              ee9f43a11eee7c94bc41d166c90db21ec131397454094c7dac72618239d694639a81dbfd88d1c3e7421d523e2da207a1b8670138a574da2f3e36186b89c76226

                                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-60340.exe

                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                              8e8db62bd1264dbce35af26e8b3ca385

                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                              9e3eb108cd0bbdc7da4c804e7cbda6aa824ee6b9

                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                              573d2357c8ddfe43f6052f6bba9a127b94b87c52be4531257cae7c93540af314

                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                              5e61e1e33eda040182cdac1846c7eb5c491bc59d8576ee6201b3e6d5c1586f9fc19b4843a573db2835cfed9aebac4ac70db4ddb9f5ea6dd36aea87b589c6f239

                                                                                                                                                                                                                                                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-63573.exe

                                                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                                                              f247aac7a2ff5033e6866f1241cd1606

                                                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                                                              a4a4f8f5904b6d759edde192be18a2c926bb1f1c

                                                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                                                              7dd55503374c0df6ab6a7abcab1a626ea3cc3951130c5f1dacf62023285013db

                                                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                                                              a6bf3e015e6e9816adbca090ea36c36e5ea7f3b162cd269311530c91e7562767692e7ed7b00b0a845e48fa947df734219f90a07d9b95021f26105316f749656e